Penetration TestingWe break your system before the bad guys can.

exploit penetration
Penetration testing helps to evaluate security flaws in systems, infrastructures, and applications which can open doorways to malicious users or hackers. Irrespective of business domain and requirement, every organization should secure their systems by doing regressive penetration testing.

We took over this task for our client who had an authentication engine. This provided authentication based on various inbuilt as well as third party libraries, SOAP, and RESTFUL web services. Due to the seriousness of this engine and multiple APIs being used, we had to carry out module based penetration testing.

Tools & Technology

  • Nessus
  • Maltego
  • Skipfish
  • BurpSuite
  • John the Ripper
  • Cain & Abel tool
  • Restful and SOAP web service
  • Kali Linux

solution

Before starting the actual penetration testing we identified the system core components and designed a test plan along with the number of test scenarios we would be able to produce. This included network, infrastructural evaluation, and application level penetration testing. We used multiple tools to complete the evaluation.

Some of the tools we used were – Nessus to test on Linux Machines; it is extremely useful in packet sniffing and injecting. Our network engineers, along with security experts, worked together to incorporate this testing. For testing web based application and SOAP web services, we used Maltego, Skipfish, and BurpSuite. This is a very sophisticated testing suite that allows intercepting proxy, modifying web request, crawling content, application scanning, etc. These tests were mainly used for application level testing and to check how the application would respond if a malicious user intercepts an HTTP request.

We evaluated if each authentication mechanism in the authentication engine had at least two-factor authentication. This included features such as captcha, security questions, and/or Site key with strong and updated encryption algorithms like AES256, with used keys that change at regular intervals.

In the case of hashing, we recommended using SHA256 instead of MD5, since MD5 can be exposed to vulnerabilities. For SSL, we ensured certificates are signed only by trusted certificate authorities.

In order to test the password encryptions in Windows based systems, we used the Cain & Abel tool. This tools allows the cracking of encrypted passwords using various techniques such as network sniffing, brute force, dictionary, cryptanalysis, routing protocol analysis, cache uncovering, etc. For Linux based systems we used John the Ripper.

Our penetration testing consisted of a detailed report of infrastructural and application level changes with the categorization of critical, high, medium, and low level risks. Some of the issues found were:

  • Insecure Http methods enabled
  • Password changes did not require the current password
  • Weak password policy
  • Weak SSl/TLS configuration
  • Secure Cookie Attribute not set

result

Based on our comprehensive testing, the client made the required changes to their infrastructure and applications. We guided them throughout the process to implement these solutions, and ensured there was no impact on existing functionalities.

Our security experts exposed various scenarios and completed a detailed penetration testing of each module and functionality. We helped the client undergo re-penetration testing to be ensure their systems were secure, and the tests were passed successfully.

ready for new adventure?

We breath technology, do you too ? Let’s get in touch.

We worked with TechForing Ltd. in several Atlassian® JIRA® and Agile Training related projects. Great team to work with. Very detail oriented!

client-justin
Justin Leader
CEO and Agile ScrumMaster, HyperVelocity Consulting

Looking for a First-Class Business Plan Consultant?